logoalt Hacker News

TZubiritoday at 5:30 PM1 replyview on HN

The capacity to grant access as a specific remote user is present without certs as well right? The typical authorized_keys file lives under a user directory and grants access only to that user.


Replies

blueflowtoday at 5:36 PM

The main advantage of certificates is that you are able to do that from the CA without touching the target machine.